MESSAGE SECURITY APPLICATION (.TXT) USING THE TRIPLE DES METHOD AND THE COMBINATION OF LSB AND BLUM-BLUM-SHUB METHODS

Main Article Content

Guido Alfino Kiu
Derwin Rony Sina
Bertha Selviana Djahi
Emerensye Sofia Yublina Pandie

Abstract

Security is one of the important aspects of the process of exchanging information (messages). To prevent misuse or attacks by unauthorized parties (attackers) on private messages, the message must be secured. Several methods can be used to secure messages, one of which is by combining the Triple Data Encryption Standard (DES) cryptography method, Blum-Blum Shub (BBS) random number generator, and Least Significant Bit (LSB) steganography. In this study, the Triple DES cryptographic method is used to encrypt messages (embedded-message) with the extension .txt and the BBS random number generator method is used to determine the position of a random pixel to be inserted in the cover-image message. The LSB steganography method is used to perform the embedding process of the encrypted embedded-message at the pixel position resulting from the BBS random number generation process. The test results show that the system can extract embedded messages hidden in a stego-image with 100% accuracy. The maximum number of embedded-message characters that can be used in the test is 150 characters. The test also produces a stego-image that has an average Peak Signal to Noise Ratio (PSNR) value of 88.61, which means that the resulting stego-image has high quality (no significant quality degradation) and the presence of messages in the stego-image is getting harder to detect (imperceptibility).

Article Details

How to Cite
[1]
G. Kiu, D. Sina, B. Djahi, and E. Pandie, “MESSAGE SECURITY APPLICATION (.TXT) USING THE TRIPLE DES METHOD AND THE COMBINATION OF LSB AND BLUM-BLUM-SHUB METHODS”, jicon, vol. 10, no. 2, pp. 204-209, Jan. 2023.
Section
Articles

References

[1] N. F. Johnson and S. Jajodia, “Exploring steganography: Seeing the unseen,” Computer, vol. 31, no. 2, pp. 26–34, 1998.
[2] M. Asad, J. Gilani, and A. Khalid, “An enhanced least significant bit modification technique for audio steganography,” in International Conference on Computer Networks and Information Technology, 2011, pp. 143–147.
[3] E. R. Djuwitaningrum and M. Apriyani, “Teknik Steganografi Pesan Teks Menggunakan Metode Least Significant Bit dan Algoritma Linear Congruential Generator,” JUITA J. Inform., vol. 4, no. 2, pp. 79–85, 2017.
[4] R. Munir, Kriptografi, Edisi Kedua. Bandung: Informatika, 2019.
[5] R. Arifin and L. T. Oktoviana, “Implementasi Kriptografi dan Steganografi menggunakan Algoritma RSA dan metode LSB,” Univ. Malang, 2013.
[6] B. Isnanto and A. A. Alkodri, “Kriptografi DES Dan Steganografi Pada Dokumen Dan Citra Digital Menggunakan Metode LSB,” J. TI Atma Luhur, vol. 1, no. 1, pp. 38–45, 2014.
[7] G. W. Bhaudhayana and I. M. Widiartha, “Implementasi algoritma kriptografi aes 256 dan metode steganografi lsb pada gambar bitmap,” J Ilmu Komput, vol. 8, no. 2, pp. 15–25, 2015.
[8] I. M. Arrijal, R. Efendi, and B. Susilo, “Penerapan Algoritma Kriptografi Kunci Simetris Dengan Modifikasi Vigenere Cipher Dalam Aplikasi Kriptografi Teks,” Pseudocode, vol. 3, no. 1, pp. 69–82, 2016.
[9] A. Rohmanu, “Implementasi kriptografi dan steganografi dengan metode algoritma DES dan metode End Of File,” J. Inform. SIMANTIK, vol. 2, no. 1, pp. 1–11, 2017.
[10] D. Darwis, W. Wamiliana, and A. Junaidi, “Proses Pengamanan Data Menggunakan Kombinasi Metode Kriptografi Data Encryption Standard dan Steganografi End Of File,” in Prosiding Seminar Nasional METODE KUANTITATIF 2017, 2017, vol. 1, no. 1, pp. 228–240.
[11] I. Utomo, W. S. Sari, and C. A. Sari, “Kombinasi Steganografi-Kriptografi Citra Menggunakan LSB Dan DES,” SNATIF, vol. 5, no. 1, 2018.
[12] P. H. Rantelinggi and E. Saputra, “Algoritma Kriptografi Triple Des dan Steganografi LSB sebagai Metode Gabungan dalam Keamanan Data,” J. Teknol. Inf. Dan Ilmu Komput., vol. 7, no. 4, pp. 661–666, 2019.
[13] I. Febriana, “PENERAPAN TEKNIK KRIPTOGRAFI PADA KEAMANAN SMS ANDROID,” JoEICT J. Educ. ICT, vol. 1, no. 1, Art. no. 1, Mar. 2017, doi: 10.29100/.v1i1.103.
[14] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Process., vol. 90, no. 3, pp. 727–752, 2010.

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.